ID

VAR-201511-0222


CVE

CVE-2015-6370


TITLE

Cisco Firepower 9000 Run on device Firepower Extensible Operating System In any OS Command root Vulnerabilities run as

Trust: 0.8

sources: JVNDB: JVNDB-2015-005971

DESCRIPTION

The Management I/O (MIO) component in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows local users to execute arbitrary OS commands as root via crafted CLI input, aka Bug ID CSCux10578. The Cisco Firepower 9000 is a set of operating systems running on the 9000 Series firewall appliances from Cisco. A local command injection vulnerability exists in the Cisco Firepower 9000 Series. Allows a local attacker to exploit this vulnerability to execute arbitrary commands with root privileges. This issue being tracked by Cisco Bug ID's CSCux10576 and CSCux10578

Trust: 2.52

sources: NVD: CVE-2015-6370 // JVNDB: JVNDB-2015-005971 // CNVD: CNVD-2015-07743 // BID: 77634 // VULHUB: VHN-84331

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-07743

AFFECTED PRODUCTS

vendor:ciscomodel:firepower extensible operating systemscope:eqversion:1.1\(1.160\)

Trust: 1.6

vendor:ciscomodel:firepower extensible operating systemscope:eqversion:1.1(1.160)

Trust: 0.8

vendor:ciscomodel:firepower extensible operating system on firepower devicesscope:eqversion:1.1(1.160)9000

Trust: 0.6

vendor:ciscomodel:firepower seriesscope:eqversion:90001.1(1.160)

Trust: 0.3

sources: CNVD: CNVD-2015-07743 // BID: 77634 // JVNDB: JVNDB-2015-005971 // CNNVD: CNNVD-201511-312 // NVD: CVE-2015-6370

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6370
value: HIGH

Trust: 1.0

NVD: CVE-2015-6370
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-07743
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201511-312
value: HIGH

Trust: 0.6

VULHUB: VHN-84331
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6370
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-07743
severity: MEDIUM
baseScore: 4.3
vectorString: AV:L/AC:L/AU:S/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84331
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-07743 // VULHUB: VHN-84331 // JVNDB: JVNDB-2015-005971 // CNNVD: CNNVD-201511-312 // NVD: CVE-2015-6370

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-84331 // JVNDB: JVNDB-2015-005971 // NVD: CVE-2015-6370

THREAT TYPE

local

Trust: 0.9

sources: BID: 77634 // CNNVD: CNNVD-201511-312

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201511-312

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005971

PATCH

title:cisco-sa-20151116-fire1url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-fire1

Trust: 0.8

sources: JVNDB: JVNDB-2015-005971

EXTERNAL IDS

db:NVDid:CVE-2015-6370

Trust: 3.4

db:BIDid:77634

Trust: 1.6

db:JVNDBid:JVNDB-2015-005971

Trust: 0.8

db:CNNVDid:CNNVD-201511-312

Trust: 0.7

db:CNVDid:CNVD-2015-07743

Trust: 0.6

db:SEEBUGid:SSVID-89894

Trust: 0.1

db:VULHUBid:VHN-84331

Trust: 0.1

sources: CNVD: CNVD-2015-07743 // VULHUB: VHN-84331 // BID: 77634 // JVNDB: JVNDB-2015-005971 // CNNVD: CNNVD-201511-312 // NVD: CVE-2015-6370

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151116-fire1

Trust: 2.0

url:http://www.securityfocus.com/bid/77634

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6370

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6370

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-07743 // VULHUB: VHN-84331 // BID: 77634 // JVNDB: JVNDB-2015-005971 // CNNVD: CNNVD-201511-312 // NVD: CVE-2015-6370

CREDITS

Cisco

Trust: 0.9

sources: BID: 77634 // CNNVD: CNNVD-201511-312

SOURCES

db:CNVDid:CNVD-2015-07743
db:VULHUBid:VHN-84331
db:BIDid:77634
db:JVNDBid:JVNDB-2015-005971
db:CNNVDid:CNNVD-201511-312
db:NVDid:CVE-2015-6370

LAST UPDATE DATE

2024-11-23T22:13:22.243000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-07743date:2015-11-24T00:00:00
db:VULHUBid:VHN-84331date:2015-11-19T00:00:00
db:BIDid:77634date:2015-11-17T00:00:00
db:JVNDBid:JVNDB-2015-005971date:2015-11-20T00:00:00
db:CNNVDid:CNNVD-201511-312date:2015-11-19T00:00:00
db:NVDid:CVE-2015-6370date:2024-11-21T02:34:52.390

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-07743date:2015-11-24T00:00:00
db:VULHUBid:VHN-84331date:2015-11-19T00:00:00
db:BIDid:77634date:2015-11-17T00:00:00
db:JVNDBid:JVNDB-2015-005971date:2015-11-20T00:00:00
db:CNNVDid:CNNVD-201511-312date:2015-11-19T00:00:00
db:NVDid:CVE-2015-6370date:2015-11-19T02:59:03.830